Phil Windley

@windley

I build things; I write code; I void warranties

Provo, Utah
Joined March 2007

Tweets

You blocked @windley

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @windley

  1. Retweeted
    1 hour ago
    Undo
  2. 10 hours ago

    No one can live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. > Authentic Digital Relationships

    Undo
  3. 10 hours ago

    Sep Utah CTO Breakfast on Friday - Join Us Online! -

    Undo
  4. Retweeted
    Sep 8

    Improve the UI/UX of interacting with Digital Wallets in the W3C Verifiable Credentials ecosystem ...

    Undo
  5. Sep 8

    Nice piece from ⁦⁩ on credentials > Trust Me! I’m A Doctor On LinkedIn

    Undo
  6. Retweeted
    Sep 4

    What's new in ? Our latest SSI Roundup covers the biggest stories from August, featuring content from , , , , , and . ⬇️

    Undo
  7. Retweeted
    Sep 2

    One more week of EarlyBird Tickets for IIWXXXI ~ Join us online near you Oct 20-22 for high energy, informative discussions on all things . What session will you lead?

    Undo
  8. Retweeted
    Sep 2

    Next Wed, Sep 9, @ noon EDT Ken Ebert, CTO of , is speaking about Hyperledger Indy & Aries and decentralized digital identities. Thanks to Hyperledger Boston for hosting this online event that is open to anyone interested in .

    Undo
  9. Retweeted
    Sep 2

    “We need to stop overthinking what a fully decentralized world looks like and remember that the only way we’ll get there is by building it use case by use case.”

    Undo
  10. Sep 1

    One of the fundamental differences between administrative ID systems like Apple ID and is that in SSI, the namespace for identifiers is controlled by the person, not the administrator. All my identifiers are in a namespace of my own making.

    Undo
  11. Sep 1
    Undo
  12. Retweeted
    Aug 31

    In December, a piece in the IEEE Journal attempted to throw shade on using Zero Knowledge Proofs (ZKP) with . It was written by creators of a non-ZKP offering. wrote an impressive rebuttal, below. Lesson: don't bring a knife to a gunfight.

    Undo
  13. Sep 1

    Great explanation of wallets and agents in their various forms. > “Digital wallet types — evaluating and understanding different models” by ⁦

    Undo
  14. Retweeted
    Aug 31
    Undo
  15. Undo
  16. Retweeted

    Our Digital Identity/SSI pilot is happening now in Turkey! This is what we are testing: 1) Syrian Entrepreneurs need to complete a Work Permit application in order to hire refugees. Currently, this process is lengthy and paper-based. // thread 🧵

    , , and 4 others
    Show this thread
    Undo
  17. Aug 27

    Great explainer video from Microsoft on self-sovereign identity > Decentralized identity explained via

    Undo
  18. Retweeted
    Aug 26
    Replying to

    Agree it’s not a silver bullet, however SSI verifiable credentials should be used to eliminate passwords which will turn eliminate phishing which is the cause of 45% of consumer data breaches.

    Undo
  19. Retweeted
    Aug 26

    isnt the silver bullet to prevent data breaches. it's a more secure set of credential constructs to not compromise at scale. Leaks of user names and passwords are from a user pov. data breaches also happen from inside - DI minimizes data stored at the SOR.

    Undo
  20. Retweeted
    Aug 25

    “In contrast to central approaches to digital identities, the creation and administration of the self-sovereign identity is carried out by the respective real entity itself.” Thomas Müller of

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·